Sciweavers

7596 search results - page 10 / 1520
» Challenges in forensic computing
Sort
View
69
Voted
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 3 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
ICASSP
2008
IEEE
15 years 4 months ago
Forensic techniques for classifying scanner, computer generated and digital camera images
Digital images can be captured or generated by a variety of sources including digital cameras, scanners and computer graphics softwares. In many cases it is important to be able t...
Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, ...
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
IH
2004
Springer
15 years 3 months ago
Relative Generic Computational Forensic Techniques
Jennifer L. Wong, Miodrag Potkonjak